• koper
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    This system would use cryptography and hardware to make sure that you are unable to lie about any of this. Basically, there is a chip inside your CPU that contains special keys installed by the manufacturer. However, this chip only activates itself when it detects that your device is running the approved software. Furthermore, it is made (almost) impossible to open this chip and retrieve the keys without destroying it.

      • koper
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        You can virtualize a TPM, but you can’t obtain a valid endorsement key.